week 2 Flashcards

1
Q

what does bitcoin network require to add new blocks to the blockchain

A

proof-of-work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

how are new blocks added to the blockchain

A

users in the network vote on new blocks and come to a consensus on whether or not to include new blocks to the chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

how does proof-of-work interact with voting

A

proof-of-work ties voting with computational power rather than digital identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how does proof-of-work tying voting to computational power help?

A

it is meant to prevent the Sybil attack in which a user can make many IDs to skew the vote

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is the ideal of 1 CPU I vote reflected in reality

A

No. there is uneven distribution of computational power so uneven distribution of votes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

does bitcoin rely on any assumptions

A

yes, that there is an honest majority of computational power; if there is an honest majority, then it will be able to mine faster than a malicious minority and have a higher probability of creating the next block; once the network comes to a consensus on a new block, it’s generally in a miner’s best interest to mine on the longest observed blockchain, which is seen as the “true” valid transaction history because it had the most work put into it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is a weakness of bitcoin

A

if a malicious actor controls more than 50% o the mining power, it can mine an alternative chain with a different transaction history and make that the longest chain. other users would then accept that chain as the “true” transaction history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what can a malicious actor do with 51% of the mining power

A

double spend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is the Goldfinger Attack

A

using 51% mining power to destroy the value of the cryptocurrency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is forkin

A

when there are multiple chains forking off of a chain or transaction history; can be intentional or unintentional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the significance of a fork

A

it means there are alternative narratives/transactions competing to become “the” block. miners eventually resolve forks and agree on one of the chains to be valid and build on that block rather than the other one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are the causes of forks

A

1) natural causes
2) double-spend attempts
3) purposeful forks to make changes to the bitcoin protocol
- hard fork: allow for previously invalid transactions to become valid
- soft fork: implement protocol updates that strictly reduce the set of valid transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

where is the value in bitcoin

A
  • it’s not backed by dollars or gold

- it’s just based on people’s belief that the numbers are worth something and a system that prevents unfair changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is scalability

A

the ability of a technology or business to be used by increasing numbers of people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what issue does scalability of bitcoin raise?

A

how to scale or improve in the face of decentralized governance: bitcoin does not have a governance mechanism in its protocol; instead, users introduce proposals called BIPs on forums and the community votes on them ad hoc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are the major differences between bitcoin and ethereum

A

1) bitcoin is a store of value, a medium of payment transaction, and alternative to regular money
2) ethereum is a platform to execute peer-to-peer “smart contracts” and applications
3) ethereum supports Turing-complete languages meaning it can perform general computation, meaning any code you can run on a regular computer can also run on ethereum. code execution is fueled by ether tokens.

17
Q

what are DAOs

A

decentralized autonomous organizations: programs on the ethereum blockchain that create a distributed government; it served as a decentralized venture capital that allowed investors to vote and decide on the distribution of funds between startups. in 2016, someone hacked it and stole money from the DAO smart contract. that led to a branching between current ethereum (which erased all transactions from the hack forward) and ethereum classic (kept all transactions intact)

18
Q

what is enterprise blockchain/private blockchain/permissioned ledgers

A

when companies use the underlying blockchain technology for their own private uses outside of just cryptocurrencies; ironically, banks use it a lot. they leverage its strengths while refusing to buckle to its goal of doing away with banks and trust systems

19
Q

how do enterprise blockchain/private blockchain/permissioned ledgers work

A

they are ledgers or blockchains in a private network within the company that do not have mining schemes and are not open to outsiders

20
Q

examples of enterprise blockchain/private blockchain/permissioned ledgers

A

R3’s Corda, JP Morgan’s Quorum and Juno, the open source Hyperledger project by Linux, IBM’s open blockchain